High severity7.5NVD Advisory· Published Apr 9, 2026· Updated Apr 17, 2026
CVE-2026-40116
CVE-2026-40116
Description
PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticated session to OpenAI's Realtime API using the server's API key. There are no limits on concurrent connections, message rate, or message size, allowing an unauthenticated attacker to exhaust server resources and drain the victim's OpenAI API credits. This vulnerability is fixed in 4.5.128.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
PraisonAIPyPI | < 4.5.128 | 4.5.128 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/MervinPraison/PraisonAI/security/advisories/GHSA-q5r4-47m9-5mc7nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-q5r4-47m9-5mc7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40116ghsaADVISORY
- github.com/MervinPraison/PraisonAI/releases/tag/v4.5.128ghsaWEB
News mentions
0No linked articles in our index yet.